Posted on
in Presentations
Two further methods for obtaining post-quantum security are discussed, namely code-based and isogeny-based cryptography.
Topic 1: Revocable Identity-based Encryption from Codes with Rank Metric (will be presented by Dr. Reza Azarderakhsh)
Authors: Donghoon Chang; Amit Kumar Chauhan; Sandeep Kumar; Somitra Kumar Sanadhya
Topic 2: An Exposure Model for Supersingular Isogeny Diffie-Hellman Key Exchange
Authors: Brian Koziel; Reza Azarderakhsh; David Jao
Share With Your Community